This list contains only the countries for which job offers have been published in the selected language (e.g., in the French version, only job offers written in French are displayed, and in the English version, only those in English).
The Security Operations Manager is a hands-on leader responsible for ensuring Apollo’s ability to detect, investigate, respond to, and recover from security incidents effectively and at scale. This role blends strong people leadership, cross-functional collaboration, and deep technical expertise in modern security operations. The Manager is expected to lead by example, remain technically engaged, and actively contribute to investigations and high-severity incidents. This role operates in a fully remote environment and requires excellent asynchronous communication and collaboration skills.
Job Responsibility:
Own and continuously improve end-to-end Security Operations processes, including detection, investigation, escalation, response, and post-incident activities
Act as senior incident leader for high-severity incidents, ensuring timely containment, calm and structured decision-making, and clear stakeholder communication
Lead and participate in complex security investigations spanning cloud infrastructure, SaaS platforms, corporate systems, user behavior, and abuse scenarios
Ensure high-quality post-incident reviews with clear root cause analysis, actionable remediation, and accountability for follow-through
Define and evolve SIEM strategy, including log source onboarding, detection use cases, alert tuning, data quality standards, and coverage validation
Oversee creation and maintenance of detection logic, correlation rules, investigation playbooks, and response workflows
Drive automation and orchestration initiatives to reduce manual effort and accelerate triage and response
Champion the use of AI-assisted tools and techniques to expedite investigation, enrichment, decision-making, and response
Build, lead, and retain a high-performing Security Operations team in a fully remote, distributed environment
Foster a culture of trust, psychological safety, operational excellence, and continuous learning
Provide clear expectations, regular feedback, and coaching aligned with individual strengths and career aspirations
Establish and maintain clear career growth paths, helping engineers develop technical depth, operational ownership, and leadership capabilities
Support onboarding, mentorship, documentation, and knowledge-sharing practices to strengthen team resilience and reduce single points of failure
Partner closely with Engineering, IT, Fraud, Legal, People, Support, and Product teams during investigations, incidents, and improvement initiatives
Collaborate deeply with Fraud teams on abuse, account compromise, automation misuse, and anomalous behavior investigations
Communicate security risk, incident impact, and remediation plans clearly to both technical and non-technical stakeholders
Define, track, and improve operational security metrics such as detection quality, investigation effectiveness, response outcomes, and incident trends
Translate business risk and platform changes into actionable operational priorities and roadmap initiatives
Contribute to the long-term Security Operations strategy for a cloud-native, SaaS-first platform, with GCP as the primary cloud environment
Requirements:
7+ years of experience in Security Operations, Incident Response, or Security Engineering
2+ years of people management experience, including hiring, coaching, and performance management, ideally in a remote-first environment
Strong hands-on experience with SIEM platforms (experience with Panther is highly valued), detection engineering, log analysis, and security investigations
Experience designing and automating security workflows and response processes
Experience with cloud-native platforms (GCP preferred
AWS and Azure also relevant) and SaaS applications
Proficiency in Python for automation, analysis, and tooling
Excellent written and verbal communication, leadership, and stakeholder management skills
Nice to have:
Familiarity with Ruby
Experience using AI or ML-assisted security tooling for detection, investigation, or response
Familiarity with vulnerability management programs, SLAs, and remediation workflows
Relevant certifications such as CISSP, GCIA, GCIH, GCED, or Google Professional Cloud Security Engineer / AWS Security Specialty
What we offer:
Investment in your growth, ensuring you have the resources, support, and autonomy to own your role and make a real impact
Collaboration is at our core—we’re all for one, meaning you’ll have a team across departments ready to help you succeed
We encourage bold ideas and courageous action, giving you the freedom to experiment, take smart risks, and drive big wins